Dolibarr多个SQL注入漏洞(CVE-2014-7137)
发布日期:2014-11-19
更新日期:2014-11-21
受影响系统:
Dolibarr Dolibarr ERP 3.5.3
不受影响系统:
Dolibarr Dolibarr ERP 3.6.1
描述:
BUGTRAQ ID: 71189
CVE(CAN) ID: CVE-2014-7137
Dolibarr ERP/CRM是管理公司业务信息的软件。
Dolibarr 3.5.3及其他版本在实现上存在多个SQL注入漏洞,攻击者可利用此漏洞执行未授权数据库操作。
<*来源:Jerzy Kramarz
链接:http://www.securityfocus.com/archive/1/534020
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
http://[IP]/dolibarr/product/stock/fiche.php?action=edit&id=1<SQL Injection>
http://[IP]/dolibarr/product/stock/liste.php?sref=55<SQL Injection>&token=142abe4c1c4b84c3d0c81533c3840cc4&sall=55
http://[IP]/dolibarr/product/stock/liste.php?sref=555-555-0199 (at) example (dot) c [email concealed]
om&token=142abe4c1c4b84c3d0c81533c3840cc4&sall=55<SQL Injection>
http://[IP]/dolibarr/projet/element.php?ref=PJ1407<SQL Injection>
http://[IP]/dolibarr/projet/tasks/index.php?search_project=5<SQL Injection>bqve&button_search.x=1&button_search.y=1&mode=
http://[IP]/dolibarr/compta/prelevement/demandes.php?search_societe=5<SQ
L Injection>&search_facture=5&button_search.x=1&button_search.y=1
http://[IP]/dolibarr/comm/mailing/liste.php?sref=5<SQL Injection>&sall=5&x=1&y=1
http://[IP]/dolibarr/comm/mailing/liste.php?sref=5&sall=5<SQL Injection>&x=1&y=1
http://[IP]/dolibarr/compta/sociales/index.php?search_label=5<SQL Injection>&button_search.x=1&button_search.y=1
http://[IP]/dolibarr/compta/paiement/cheque/liste.php?sortfield=bc.numbe
r<SQL Injection>&sortorder=asc&begin=&
http://[IP]/dolibarr/compta/paiement/cheque/liste.php?sortfield=bc.numbe
r&sortorder=asc<SQL Injection>&begin=&
http://[IP]/dolibarr/compta/prelevement/rejets.php?sortfield=p.ref<SQL Injection>&sortorder=asc&begin=&
http://[IP]/dolibarr/compta/prelevement/rejets.php?sortfield=p.ref&sorto
rder=asc<SQL Injection>&begin=&
http://[IP]/dolibarr/product/liste.php?sortfield=p.ref&sortorder=asc&beg
in=&sref=&snom=&sall=&tosell=<SQL Injection>&tobuy=&type=&
http://[IP]/dolibarr/product/liste.php?sortfield=p.ref&sortorder=asc&beg
in=&sref=&snom=&sall=&tosell=&tobuy=<SQL Injection>&type=&
http://[IP]/dolibarr/product/reassort.php?toolowstock=on&snom=5&sortorde
r=ASC&sref=5&token=d638ca7f80a7ad68e2cf327a75f954a6&button_search.x=1&bu
tton_search.y=1&type=&search_categ=4<SQL Injection>&sortfield=stock_physique
http://[IP]/dolibarr/product/liste.php?sortfield=p.ref&sortorder=asc&beg
in=&sref=&snom=&sall=&tosell=1<SQL Injection>&tobuy=&type=&
http://[IP]/dolibarr/product/liste.php?sortfield=p.ref&sortorder=asc&beg
in=&sref=&snom=&sall=&tosell=1&tobuy=<SQL Injection>&type=&
http://[IP]/dolibarr/product/stats/commande_fournisseur.php?sortfield=c.
rowid<SQL Injection>&sortorder=asc&begin=&id=2
http://[IP]/dolibarr/product/stats/commande_fournisseur.php?sortfield=c.
rowid&sortorder=asc<SQL Injection>&begin=&id=2
http://[IP]/dolibarr/product/stats/contrat.php?sortfield=c.rowid<SQL Injection>&sortorder=asc&begin=&id=2
http://[IP]/dolibarr/product/stats/contrat.php?sortfield=c.rowid'&sortor
der=asc<SQL Injection>&begin=&id=2
http://[IP]/dolibarr/product/stats/facture_fournisseur.php?sortfield=s.r
owid<SQL Injection>&sortorder=asc&begin=&id=2
http://[IP]/dolibarr/product/stats/facture_fournisseur.php?sortfield=s.r
owid&sortorder=asc<SQL Injection>&begin=&id=2
http://[IP]/dolibarr/product/stats/propal.php?sortfield=p.rowid<SQL Injection>&sortorder=asc&begin=&id=2
http://[IP]/dolibarr/product/stats/propal.php?sortfield=p.rowid&sortorde
r=asc<SQL Injection>&begin=&id=2
http://[IP]/dolibarr/product/stock/fiche.php?id=0<SQL Injection>
http://[IP]/dolibarr/product/stock/info.php?id=0<SQL Injection>
http://[IP]/dolibarr/product/stock/liste.phpsortfield=e.label&sortorder=
asc<SQL Injection>&begin=&
http://[IP]/dolibarr/product/stock/liste.php?sortfield=e.label<SQL Injection>&sortorder=asc&begin=&
http://[IP]/dolibarr/product/reassort.php?toolowstock=on&snom=5&sortorde
r=ASC&sref=5<SQL Injection>&token=d638ca7f80a7ad68e2cf327a75f954a6&button_search.x=1&butt
on_search.y=1&type=&search_categ=4&sortfield=stock_physique
http://[IP]/dolibarr/product/stock/massstockmove.php?productid=1<SQL Injection>&token=9d491e55462571d39390bd136f4f50da&id_tw=-1&action=addlin
e&qty=5&id_sw=-1&addline=%D8%B1%D8%AA%D8%AE%D8%A7&search_productid=5
http://[IP]/dolibarr/product/stock/replenishorders.php?sortfield=cf.ref&
sortorder=asc<SQL Injection>&begin=&
http://[IP]/dolibarr/product/stock/replenishorders.php?sortfield=cf.ref<
SQL Injection>&sortorder=asc&begin=&
http://[IP]/dolibarr/projet/contact.php?id=1&action=deletecontact&lineid
=21<SQL Injection>
http://[IP]/dolibarr/projet/contact.php?id=1&action=swapstatut&ligne=21<
SQL Injection>
http://[IP]/dolibarr/projet/tasks/contact.php?id=1&action=swapstatut&lig
ne=21<SQL Injection>
http://[IP]/dolibarr/compta/recap-compta.php?socid=1<SQL Injection>
http://[IP]/dolibarr/holiday/index.php?mainmenu=holiday&id=1<SQL Injection>
http://[IP]/dolibarr/projet/tasks/contact.php?id=2&source=internal&token
=acff06ed1720e3ec66a16918dcee2bfd&action=addcontact&type=181&contactid=2
<SQL Injection>&withproject=1
http://[IP]/dolibarr/product/stock/fiche.php?id=1<SQL Injection>
http://[IP]/dolibarr/projet/contact.php?ref=PJ1407-0002<SQL Injection>
http://[IP]/dolibarr/projet/ganttview.php?ref=PJ1407-0002<SQL Injection>
http://[IP]/dolibarr/product/stock/fiche.php?id=1<SQL Injection>
http://[IP]/dolibarr/projet/note.php?ref=PJ1407-0002<SQL Injection>
http://[IP]/dolibarr/projet/tasks/contact.php?project_ref=PJ1407-0002<SQ
L Injection>&withproject=1
http://[IP]/dolibarr/projet/tasks.php?ref=PJ1407-0002<SQL Injection>&mode=mine
http://[IP]/dolibarr/projet/tasks/note.php?project_ref=PJ1407-0002<SQL Injection>&withproject=1
http://[IP]/dolibarr/contact/info.php?id=2<SQL Injection>&optioncss=print
http://[IP]/dolibarr/societe/commerciaux.php?socid=117260852<SQL Injection>&optioncss=print
http://[IP]/dolibarr/compta/dons/liste.php?statut=2<SQL Injection>
http://[IP]/dolibarr/societe/rib.php?socid=1<SQL Injection>&optioncss=print
http://[IP]/dolibarr/adherents/liste.php?leftmenu=members&statut=1<SQL Injection>&filter=outofdate&idmenu=9431&mainmenu=members
http://[IP]/dolibarr/product/reassort.php?sortfield=p.ref&sortorder=asc&
begin=&tosell=43<SQL Injection>&tobuy=&type=0&fourn_id=&snom=&sref=&
http://[IP]/dolibarr/product/reassort.php?sortfield=p.ref&sortorder=asc&
begin=&tosell=&tobuy=3<SQL Injection>&type=0&fourn_id=&snom=&sref=&
http://[IP]/dolhttp://[IP]/dolibarr/product/index.php?leftmenu=product&t
ype=0<SQL Injection>&idmenu=2819&mainmenu=products
http://[IP]/dolibarr/product/stats/facture.php?sortfield=s.rowid<SQL Injection>&sortorder=asc&begin=&id=2
http://[IP]/dolibarr/product/stats/facture.php?sortfield=s.rowid&sortord
er=asc<SQL Injection>&begin=&id=2
http://[IP]/dolibarr/user/index.php?sortfield=u.login&sortorder=asc&begi
n=search_user=&sall=&search_statut=<SQL Injection>&
http://[IP]/dolibarr/compta/bank/fiche.php?id=<SQL Injection>
http://[IP]/dolibarr/compta/prelevement/liste.php?search_code=5<SQL Injection>&search_societe=5&search_ligne=5&search_bon=5&button_search.x=
1&button_search.y=1
http://[IP]/dolibarr/compta/prelevement/liste.php?search_code=5&search_s
ociete=5<SQL Injection>&search_ligne=5&search_bon=5&button_search.x=1&button_search.y
=1
http://[IP]/dolibarr/compta/prelevement/liste.php?search_code=5&search_s
ociete=5&search_ligne=5<SQL Injection>&search_bon=5&button_search.x=1&button_search.y=1
http://[IP]/dolibarr/compta/prelevement/liste.php?search_code=5&search_s
ociete=5&search_ligne=5&search_bon=5<SQL Injection>&button_search.x=1&button_search.y=1
http://[IP]/dolibarr/compta/prelevement/bons.php?sortfield=p.ref&sortord
er=asc<SQL Injection>&begin=&
http://[IP]/dolibarr/compta/prelevement/bons.php?sortfield=p.ref<SQL Injection>&sortorder=asc&begin=&
http://[IP]/dolibarr/product/stats/commande.php?sortfield=c.rowid&sortor
der=asc<SQL Injection>&begin=&id=2
http://[IP]/dolibarr/product/stats/commande.php?sortfield=c.rowid<SQL Injection>&sortorder=asc&begin=&id=2
建议:
厂商补丁:
Dolibarr
--------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://www.dolibarr.org/
https://www.portcullis-security.com/security-research-and-downloads/secu
rity-advisories/cve-2014-7137/
Dolibarr 的详细介绍:请点这里
Dolibarr 的下载地址:请点这里